Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)
☆21Oct 18, 2024Updated last year
Alternatives and similar repositories for DetectCobaltStrike
Users that are interested in DetectCobaltStrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- ☆15Jul 13, 2024Updated last year
- ☆12Feb 28, 2023Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆34Jun 17, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- 小玩具,用来快速检测银狐家族恶意程序,和部分RAT/C2产品☆69Jan 7, 2025Updated last year
- ☆26Apr 24, 2025Updated last year
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Apr 12, 2020Updated 6 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆68Aug 25, 2022Updated 3 years ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆22Jul 4, 2023Updated 2 years ago
- ☆24Dec 18, 2022Updated 3 years ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆163Oct 27, 2024Updated last year
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆14Sep 14, 2023Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Mar 4, 2023Updated 3 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 5 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆84May 23, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 一个简单的批量反编译jar包的小脚本☆45Mar 20, 2022Updated 4 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- ☆36Jan 23, 2025Updated last year
- Port of Cobalt Strike's Process Inject Kit☆193Dec 1, 2024Updated last year
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- 重构Beacon☆166Aug 19, 2024Updated last year
- ☆60Oct 17, 2024Updated last year
- Windows Persistence IT-Security☆112Mar 9, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- bypassuac、administrator->system提权的免杀小工具,可过Defender、360、卡巴等☆22Jan 1, 2023Updated 3 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆66Jun 25, 2025Updated 10 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆71Mar 6, 2026Updated last month
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- ☆100Sep 20, 2021Updated 4 years ago
- ☆26Apr 10, 2023Updated 3 years ago
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated 2 years ago